SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can you restrict users to create sub-folders in a dfs root share?
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
It will display driver signing status
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Restrict the share permissions of the DFS root share.
2. What is the command to set a forwarding computer for event log forwarding?
WINRM QUICKCONFIG.
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Ping the Link Local Address (FE80 Address)
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
3. Why would you add additional drivers for the various operating systems in your organization that will be connecting to the shared printer when sharing a printer?
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
To will ensure the clients download the appropriate printer driver.
4. What should you modify of the NAP Agent client service if the computer needs to prove health status?
The local security logs.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
Problem history but also application installation history.
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
5. What can In-Private Browsing not display?
Suggested Sites
Windows 7 Ultimate.
The domain profile not the public or private.
Perform an offline migration
6. What does the WSUS DB Store?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
Not supported
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
7. How do you create a subscription?
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
Using wecutil -cs in an xml file.
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
8. What is another way to deploy an application compatibility database across multiple computers?
Devices and Printers Control Panel applet has a
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
Us edit dnscmd /zoneupdatefromdns command.
Windows XP and Server 2003.
9. How many bits are in the regional prefix?
The domain profile not the public or private.
IPV4 and IPV6
4 (bits 49 - 52) /52 Allows for 16 regions.
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
10. What do wireless access points need in order for NAP to enforce wireless access policy (WAP)?
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
Run: Cscript slmgr.vbs /dl
It is the authentication header protocol and digitally sign packets but not encrypt them.
They need to be configured us use 802.1x RADIUS authentication
11. What does Windows ReadyBoost do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. How can you use ImageX to apply a WIM Image directly to a VHD file?
Sent across the network
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
The Default Programs Control Panel applet
13. What is jetpack.exe?
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
14. Use ocsetup instead of servermanagercmd.exe _________.
On a core server
Use SYNC Center
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
15. What is the cache.DNS file?
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
A file that is loaded when a DNS server starts up and populate the root hints.
16. What OS can Applocker policies not be enforced?
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Suggested Sites
Yes
Windows 7 Professional.
17. What does dnscmd /zoneadd dsprimary do?
Add an AD integrated zone
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
No they are disabled
To display friendly labels to capture packet address headers.
18. What does Diskpart.exe do?
Forward to another DNS server
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Can be used to create virtual hard disks
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
19. What service has to be started for Applocker to work?
Conditional forward
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
The Application Identity Service
20. If you wanted to encrypt the connection between a client PC and the WSUS server what would you use?
It designates an authoritative DNS server - not the soa record.
SSL
Windows 7 Enterprise and Ultimate Editions
Through a GPO.
21. Can you choose which media libraries you want to share with your homegroup?
Command to configure the TCP/IP settings.
Configure aging and scavenging.
Yes
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
22. How should EFS files should be recovered?
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
Se a capture filter based on the mac address of the problem PC.
Use the Import Foreign Disk option on the target computer
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
23. How do you configure DHCP to ignore clients on a particular subnet?
By unbinding the DHCP protocol from the nic attached to the subnet.
A CONFIG.XML file
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Use it to can backup certificates to a .PFX file that is password protected.
24. How do you configure WSUS computer groups for defined updates?
Only a local administrator
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
By either using WSUS management console (server side targeting) or GPO (client side targeting).
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
25. How do you add the Windows 7 VHD to the boot choices menu?
Use the BCDEDIT.EXE command
Windows 7 Professional.
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
26. What does the Ping -6 option do?
Increase the SOA refresh interval parameter.
Windows Vista - Window 7 and Server 2008.
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
It pings with IPV6
27. How do you upgrade windows 7?
Which processes currently consume a resource like processor utilization.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
They are AAAA records.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
28. What is Bcdboot?
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
It improves performance
29. What is s stub zone?
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
Contains a list of dynamically updated list of authorities for the zone.
By creating or modifying a wireless connection in Network and Sharing Center.
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
30. What does the max=32000 mean in 'create vdisk file = c: vhd windows 7 vhdfilename.vhd max = 32000'
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
It is the max size is expressed in megabytes.
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
To another hard disk in the same computer - network or to removable media.
31. What does "Create System Repair Disk" option do?
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
1723
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
On the zone file of the DNS server in the DNS manager.
32. Where should you backup to automate System Image backups and maintain multiple images?
Modify/Create a GPO
Yes
A network location.
Add an AD integrated zone
33. What controlls file extensions?
The Default Programs Control Panel applet
DNS suffix search lists
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
34. How do you create a custom Windows PE image that supports windows scripting host?
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
IPV6 transition technologies
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
35. What port uses PPTP uses?
DHCPv6 obtains additional configuration settigns.
They must be configured with the ip addresses of the radius server.
1723
The local security logs.
36. What is Drvload?
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
The ICMP protocol.
37. What does Internet Explorer store while you are surfing using InPrivate Browsing?
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
Only a local administrator
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
38. What do NAP clients do?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
39. What is WPA-EAP?
WPA-Enterprise (radius authentication)
L2TP/IPSEC with EAP-TLS.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Use IPV6 Unique Local Addresses.
40. What does the MigDocs.xml file do?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
4 (bits 53 - 56) /56 Allows for 16 regions
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
41. What is required to upgrade Vista to Windows 7?
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
IN the WindowsUpdateClient log in the system log portion of event viewer.
The latest Vista Service Pack
42. How many bits are in the GLOBAL/UNIQUE LOCAL prefix?
they are enforced and will not allow a user to exceed the space limit.
They are in the first 48 bits /48
Windows 7 Enterprise and Ultimate Editions
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
43. What is an example of a rule based on file attributes derived from the digital signature?
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
Windows Aero was revised to be more touch-friendly.
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
44. What does Scanstate /GENMIGXML do?
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Use it to generate an EFS user certificate
Deploy a secondary zone.
It create a report of which files will be migrated
45. How do you configure client computers to use a WSUS server as the source for Windows Update?
Modify/Create a GPO
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
Vista SP1 and Server 2008 and above.
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
46. How does a autoconfiguration router or DHCP assign a IPV6 address (after the Local Link Address)?
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
It is the authentication header protocol and digitally sign packets but not encrypt them.
Either from wbadmin or windows server backup.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
47. Can DISM can apply an answer file to an offline image?
Use the net sh command to configure the proper ports for remote management.
Set IE back to its default settings
Extensive Authentication Protocol used in PPP authentication.
Yes
48. What will a (.root) zone do in a DNS server?
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
Prevents the server from performing Internet name resolution.
Delete all the zone files or reinstall the DNS service.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
49. What is a reservation?
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
A CONFIG.XML file
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
50. What is new in Windows User State Migration Tool (USMT) 4.0?
Sett up a priority for the preferred smtp server.
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100